Privacy policy for enterprise solutions

Page tree
Skip to end of metadata
Go to start of metadata
Client Dashboard

The Dashboard area provides you with information about the current state of the clients in the network.

G DATA Security Status

Under G DATA Security Status you can set all the basic security settings for the clients or groups you have selected in the Clients section.

By clicking on the respective entry, you can perform actions here directly or switch to the respective task area. As soon as you have optimized the settings of a component with the attention symbol, the symbol in the status area changes back to the green symbol.

For a quick detailed overview, the Clients - Overview is more suitable.

Client Connections

The Client Connections section provides a time-based overview of the connections that the respective clients have had with G DATA ManagementServer. Care should be taken to ensure that all clients connect to G DATA ManagementServer on a regular basis. To better control the connections, each client sends a heartbeat every hour. If this fails, the client is probably offline. If the heartbeat is sent, but the client does not update the virus signature updates, for example, there is a communication failure.

Clicking on the pie chart takes you to the client overview, where the security status is already pre-filtered according to the selected area.

Top 10 Clients - Warnings

The Top 10 Clients - Warnings overview helps to find problematic clients. The chart shows the clients with the most virus reports. While G DATA successfully fends off these infections, the fact that certain clients are often attacked by malware may indicate problems. Perhaps one of the other protection mechanisms is misconfigured, or the end user is particularly at risk due to targeted malware attacks or careless (surfing) behavior. Here, the client's security configuration should be checked. If the end user's (mis)behavior is a possible cause, PolicyManager policies can be used to restrict access to dubious resources.

Clicking on the displayed client name takes you directly to the security events for this client.

Report Status

The chart shows infections, errors, and Firewall and PolicyManager requests. Excessive errors from any of the modules or other notable spikes in the graph can be checked via the individual reports in the Security Events module.

  • No labels